diff --git a/.gitattributes b/.gitattributes
deleted file mode 100644
index da8c15f..0000000
--- a/.gitattributes
+++ /dev/null
@@ -1 +0,0 @@
-flake.lock binary
diff --git a/flake.lock b/flake.lock
index 78b8ed1..6391c4b 100644
--- a/flake.lock
+++ b/flake.lock
@@ -28,11 +28,11 @@
"systems": "systems"
},
"locked": {
- "lastModified": 1747575206,
- "narHash": "sha256-NwmAFuDUO/PFcgaGGr4j3ozG9Pe5hZ/ogitWhY+D81k=",
+ "lastModified": 1736955230,
+ "narHash": "sha256-uenf8fv2eG5bKM8C/UvFaiJMZ4IpUFaQxk9OH5t/1gA=",
"owner": "ryantm",
"repo": "agenix",
- "rev": "4835b1dc898959d8547a871ef484930675cb47f1",
+ "rev": "e600439ec4c273cf11e06fe4d9d906fb98fa097c",
"type": "github"
},
"original": {
@@ -73,22 +73,6 @@
"url": "https://git.lelgenio.com/lelgenio/catboy-spinner"
}
},
- "contador-da-viagem": {
- "flake": false,
- "locked": {
- "lastModified": 1742610036,
- "narHash": "sha256-sY1iheemazmIVJAnoFtut6cN7HX/C5OMDY54UrmCoqE=",
- "ref": "refs/heads/main",
- "rev": "efe5ac4a16de7f78824ac89dc987ef635afa5267",
- "revCount": 4,
- "type": "git",
- "url": "https://git.lelgenio.com/lelgenio/contador-da-viagem"
- },
- "original": {
- "type": "git",
- "url": "https://git.lelgenio.com/lelgenio/contador-da-viagem"
- }
- },
"crane": {
"inputs": {
"flake-compat": "flake-compat",
@@ -163,11 +147,11 @@
]
},
"locked": {
- "lastModified": 1744478979,
- "narHash": "sha256-dyN+teG9G82G+m+PX/aSAagkC+vUv0SgUw3XkPhQodQ=",
+ "lastModified": 1700795494,
+ "narHash": "sha256-gzGLZSiOhf155FW7262kdHo2YDeugp3VuIFb4/GGng0=",
"owner": "lnl7",
"repo": "nix-darwin",
- "rev": "43975d782b418ebf4969e9ccba82466728c2851b",
+ "rev": "4b9b83d5a92e8c1fbfd8eb27eda375908c11ec4d",
"type": "github"
},
"original": {
@@ -225,11 +209,11 @@
]
},
"locked": {
- "lastModified": 1747742835,
- "narHash": "sha256-kYL4GCwwznsypvsnA20oyvW8zB/Dvn6K5G/tgMjVMT4=",
+ "lastModified": 1741786315,
+ "narHash": "sha256-VT65AE2syHVj6v/DGB496bqBnu1PXrrzwlw07/Zpllc=",
"owner": "nix-community",
"repo": "disko",
- "rev": "df522e787fdffc4f32ed3e1fca9ed0968a384d62",
+ "rev": "0d8c6ad4a43906d14abd5c60e0ffe7b587b213de",
"type": "github"
},
"original": {
@@ -297,11 +281,11 @@
"flake-compat_2": {
"flake": false,
"locked": {
- "lastModified": 1747046372,
- "narHash": "sha256-CIVLLkVgvHYbgI2UpXvIIBJ12HWgX+fjA8Xf8PUmqCY=",
+ "lastModified": 1696426674,
+ "narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=",
"owner": "edolstra",
"repo": "flake-compat",
- "rev": "9100a0f413b0c601e0533d1d94ffd501ce2e7885",
+ "rev": "0f9255e01c2351cc7d116c072cb317785dd33b33",
"type": "github"
},
"original": {
@@ -433,54 +417,6 @@
"type": "github"
}
},
- "git-hooks": {
- "inputs": {
- "flake-compat": [
- "nixos-mailserver",
- "flake-compat"
- ],
- "gitignore": "gitignore",
- "nixpkgs": [
- "nixos-mailserver",
- "nixpkgs"
- ]
- },
- "locked": {
- "lastModified": 1742649964,
- "narHash": "sha256-DwOTp7nvfi8mRfuL1escHDXabVXFGT1VlPD1JHrtrco=",
- "owner": "cachix",
- "repo": "git-hooks.nix",
- "rev": "dcf5072734cb576d2b0c59b2ac44f5050b5eac82",
- "type": "github"
- },
- "original": {
- "owner": "cachix",
- "repo": "git-hooks.nix",
- "type": "github"
- }
- },
- "gitignore": {
- "inputs": {
- "nixpkgs": [
- "nixos-mailserver",
- "git-hooks",
- "nixpkgs"
- ]
- },
- "locked": {
- "lastModified": 1709087332,
- "narHash": "sha256-HG2cCnktfHsKV0s4XW83gU3F57gaTljL9KNSuG6bnQs=",
- "owner": "hercules-ci",
- "repo": "gitignore.nix",
- "rev": "637db329424fd7e46cf4185293b9cc8c88c95394",
- "type": "github"
- },
- "original": {
- "owner": "hercules-ci",
- "repo": "gitignore.nix",
- "type": "github"
- }
- },
"hello-fonts": {
"flake": false,
"locked": {
@@ -504,16 +440,16 @@
]
},
"locked": {
- "lastModified": 1747556831,
- "narHash": "sha256-Qb84nbYFFk0DzFeqVoHltS2RodAYY5/HZQKE8WnBDsc=",
+ "lastModified": 1742234739,
+ "narHash": "sha256-zFL6zsf/5OztR1NSNQF33dvS1fL/BzVUjabZq4qrtY4=",
"owner": "nix-community",
"repo": "home-manager",
- "rev": "d0bbd221482c2713cccb80220f3c9d16a6e20a33",
+ "rev": "f6af7280a3390e65c2ad8fd059cdc303426cbd59",
"type": "github"
},
"original": {
"owner": "nix-community",
- "ref": "release-25.05",
+ "ref": "release-24.11",
"repo": "home-manager",
"type": "github"
}
@@ -545,11 +481,11 @@
]
},
"locked": {
- "lastModified": 1747540584,
- "narHash": "sha256-cxCQ413JTUuRv9Ygd8DABJ1D6kuB/nTfQqC0Lu9C0ls=",
+ "lastModified": 1742174123,
+ "narHash": "sha256-pDNzMoR6m1ZSJToZQ6XDTLVSdzIzmFl1b8Pc3f7iV6Y=",
"owner": "Mic92",
"repo": "nix-index-database",
- "rev": "ec179dd13fb7b4c6844f55be91436f7857226dce",
+ "rev": "2cfb4e1ca32f59dd2811d7a6dd5d4d1225f0955c",
"type": "github"
},
"original": {
@@ -562,23 +498,22 @@
"inputs": {
"blobs": "blobs",
"flake-compat": "flake-compat_2",
- "git-hooks": "git-hooks",
"nixpkgs": [
"nixpkgs"
],
- "nixpkgs-25_05": "nixpkgs-25_05"
+ "nixpkgs-24_11": "nixpkgs-24_11"
},
"locked": {
- "lastModified": 1747965231,
- "narHash": "sha256-BW3ktviEhfCN/z3+kEyzpDKAI8qFTwO7+S0NVA0C90o=",
+ "lastModified": 1742413977,
+ "narHash": "sha256-NkhM9GVu3HL+MiXtGD0TjuPCQ4GFVJPBZ8KyI2cFDGU=",
"owner": "simple-nixos-mailserver",
"repo": "nixos-mailserver",
- "rev": "53007af63fade28853408370c4c600a63dd97f41",
+ "rev": "b4fbffe79c00f19be94b86b4144ff67541613659",
"type": "gitlab"
},
"original": {
"owner": "simple-nixos-mailserver",
- "ref": "nixos-25.05",
+ "ref": "master",
"repo": "nixos-mailserver",
"type": "gitlab"
}
@@ -599,29 +534,28 @@
"type": "github"
}
},
- "nixpkgs-25_05": {
+ "nixpkgs-24_11": {
"locked": {
- "lastModified": 1747610100,
- "narHash": "sha256-rpR5ZPMkWzcnCcYYo3lScqfuzEw5Uyfh+R0EKZfroAc=",
+ "lastModified": 1734083684,
+ "narHash": "sha256-5fNndbndxSx5d+C/D0p/VF32xDiJCJzyOqorOYW4JEo=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "ca49c4304acf0973078db0a9d200fd2bae75676d",
+ "rev": "314e12ba369ccdb9b352a4db26ff419f7c49fa84",
"type": "github"
},
"original": {
- "owner": "NixOS",
- "ref": "nixos-25.05",
- "repo": "nixpkgs",
- "type": "github"
+ "id": "nixpkgs",
+ "ref": "nixos-24.11",
+ "type": "indirect"
}
},
"nixpkgs-unstable": {
"locked": {
- "lastModified": 1747744144,
- "narHash": "sha256-W7lqHp0qZiENCDwUZ5EX/lNhxjMdNapFnbErcbnP11Q=",
+ "lastModified": 1742422364,
+ "narHash": "sha256-mNqIplmEohk5jRkqYqG19GA8MbQ/D4gQSK0Mu4LvfRQ=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "2795c506fe8fb7b03c36ccb51f75b6df0ab2553f",
+ "rev": "a84ebe20c6bc2ecbcfb000a50776219f48d134cc",
"type": "github"
},
"original": {
@@ -678,26 +612,26 @@
},
"nixpkgs_5": {
"locked": {
- "lastModified": 1747953325,
- "narHash": "sha256-y2ZtlIlNTuVJUZCqzZAhIw5rrKP4DOSklev6c8PyCkQ=",
+ "lastModified": 1742388435,
+ "narHash": "sha256-GheQGRNYAhHsvPxWVOhAmg9lZKkis22UPbEHlmZMthg=",
"owner": "NixOS",
"repo": "nixpkgs",
- "rev": "55d1f923c480dadce40f5231feb472e81b0bab48",
+ "rev": "b75693fb46bfaf09e662d09ec076c5a162efa9f6",
"type": "github"
},
"original": {
"id": "nixpkgs",
- "ref": "nixos-25.05",
+ "ref": "nixos-24.11",
"type": "indirect"
}
},
"nixpkgs_6": {
"locked": {
- "lastModified": 1745377448,
- "narHash": "sha256-jhZDfXVKdD7TSEGgzFJQvEEZ2K65UMiqW5YJ2aIqxMA=",
+ "lastModified": 1735554305,
+ "narHash": "sha256-zExSA1i/b+1NMRhGGLtNfFGXgLtgo+dcuzHzaWA6w3Q=",
"owner": "nixos",
"repo": "nixpkgs",
- "rev": "507b63021ada5fee621b6ca371c4fca9ca46f52c",
+ "rev": "0e82ab234249d8eee3e8c91437802b32c74bb3fd",
"type": "github"
},
"original": {
@@ -775,7 +709,6 @@
"inputs": {
"agenix": "agenix",
"catboy-spinner": "catboy-spinner",
- "contador-da-viagem": "contador-da-viagem",
"demoji": "demoji",
"dhist": "dhist",
"disko": "disko",
@@ -850,11 +783,11 @@
]
},
"locked": {
- "lastModified": 1747603214,
- "narHash": "sha256-lAblXm0VwifYCJ/ILPXJwlz0qNY07DDYdLD+9H+Wc8o=",
+ "lastModified": 1742406979,
+ "narHash": "sha256-r0aq70/3bmfjTP+JZs4+XV5SgmCtk1BLU4CQPWGtA7o=",
"owner": "Mic92",
"repo": "sops-nix",
- "rev": "8d215e1c981be3aa37e47aeabd4e61bb069548fd",
+ "rev": "1770be8ad89e41f1ed5a60ce628dd10877cb3609",
"type": "github"
},
"original": {
@@ -1010,11 +943,11 @@
"nixpkgs": "nixpkgs_6"
},
"locked": {
- "lastModified": 1747912973,
- "narHash": "sha256-XgxghfND8TDypxsMTPU2GQdtBEsHTEc3qWE6RVEk8O0=",
+ "lastModified": 1742370146,
+ "narHash": "sha256-XRE8hL4vKIQyVMDXykFh4ceo3KSpuJF3ts8GKwh5bIU=",
"owner": "numtide",
"repo": "treefmt-nix",
- "rev": "020cb423808365fa3f10ff4cb8c0a25df35065a3",
+ "rev": "adc195eef5da3606891cedf80c0d9ce2d3190808",
"type": "github"
},
"original": {
@@ -1025,11 +958,11 @@
},
"vpsadminos": {
"locked": {
- "lastModified": 1748016252,
- "narHash": "sha256-P/h9BTZv6r5br/MKkXyEdUdDTU446UaAZzGLQMCMSIw=",
+ "lastModified": 1742222981,
+ "narHash": "sha256-EDhfWimpzUnpH5h/FQ3oYw/Kaq4Cx1E5nRofDQyI3aE=",
"owner": "vpsfreecz",
"repo": "vpsadminos",
- "rev": "4756a2ecc603c347e3d983663d663e96f22225a9",
+ "rev": "14da38b9a49bf156e06f20ed02533a0549e6d487",
"type": "github"
},
"original": {
diff --git a/flake.nix b/flake.nix
index 05332a4..fd1bac2 100644
--- a/flake.nix
+++ b/flake.nix
@@ -1,10 +1,10 @@
{
description = "My system config";
inputs = {
- nixpkgs.url = "nixpkgs/nixos-25.05";
+ nixpkgs.url = "nixpkgs/nixos-24.11";
nixpkgs-unstable.url = "nixpkgs/nixos-unstable";
- home-manager.url = "github:nix-community/home-manager/release-25.05";
+ home-manager.url = "github:nix-community/home-manager/release-24.11";
home-manager.inputs.nixpkgs.follows = "nixpkgs";
vpsadminos.url = "github:vpsfreecz/vpsadminos";
@@ -32,7 +32,7 @@
};
nixos-mailserver = {
- url = "gitlab:simple-nixos-mailserver/nixos-mailserver/nixos-25.05";
+ url = "gitlab:simple-nixos-mailserver/nixos-mailserver/master";
inputs.nixpkgs.follows = "nixpkgs";
};
@@ -56,10 +56,6 @@
wl-crosshair.url = "github:lelgenio/wl-crosshair";
warthunder-leak-counter.url = "git+https://git.lelgenio.com/lelgenio/warthunder-leak-counter";
made-you-look.url = "git+https://git.lelgenio.com/lelgenio/made-you-look";
- contador-da-viagem = {
- url = "git+https://git.lelgenio.com/lelgenio/contador-da-viagem";
- flake = false;
- };
catboy-spinner = {
url = "git+https://git.lelgenio.com/lelgenio/catboy-spinner";
flake = false;
diff --git a/hosts/monolith/default.nix b/hosts/monolith/default.nix
index 753047a..280cc3f 100644
--- a/hosts/monolith/default.nix
+++ b/hosts/monolith/default.nix
@@ -144,7 +144,7 @@ in
ACTION=="add" SUBSYSTEM=="usb" ATTR{idVendor}=="046d" ATTR{idProduct}=="c547" ATTR{power/wakeup}="disabled"
# Force all disks to use mq-deadline scheduler
# For some reason "noop" is used by default which is kinda bad when io is saturated
- ACTION=="add|change", KERNEL=="sd[a-z]*[0-9]*|mmcblk[0-9]*p[0-9]*|nvme[0-9]*n[0-9]*p[0-9]*", ATTR{../queue/scheduler}="kyber"
+ ACTION=="add|change", KERNEL=="sd[a-z]*[0-9]*|mmcblk[0-9]*p[0-9]*|nvme[0-9]*n[0-9]*p[0-9]*", ATTR{../queue/scheduler}="mq-deadline"
'';
boot.tmp = {
diff --git a/hosts/phantom/default.nix b/hosts/phantom/default.nix
index 1b0d3cb..9111434 100644
--- a/hosts/phantom/default.nix
+++ b/hosts/phantom/default.nix
@@ -53,7 +53,7 @@
# Set your time zone.
time.timeZone = "America/Sao_Paulo";
# Select internationalisation properties.
- i18n.defaultLocale = "pt_BR.UTF-8";
+ i18n.defaultLocale = "pt_BR.utf8";
boot.kernel.sysctl."fs.inotify.max_user_watches" = 1048576;
diff --git a/hosts/phantom/goofs.nix b/hosts/phantom/goofs.nix
index dfb5736..c0b670a 100644
--- a/hosts/phantom/goofs.nix
+++ b/hosts/phantom/goofs.nix
@@ -43,9 +43,4 @@
forceSSL = true;
root = inputs.hello-fonts;
};
- services.nginx.virtualHosts."contador-da-viagem.lelgenio.com" = {
- enableACME = true;
- forceSSL = true;
- root = inputs.contador-da-viagem;
- };
}
diff --git a/hosts/phantom/nextcloud.nix b/hosts/phantom/nextcloud.nix
index 28d76a1..a7ef9f3 100644
--- a/hosts/phantom/nextcloud.nix
+++ b/hosts/phantom/nextcloud.nix
@@ -1,6 +1,7 @@
{
config,
pkgs,
+ inputs,
...
}:
{
@@ -10,7 +11,6 @@
hostName = "cloud.lelgenio.com";
https = true;
config = {
- dbtype = "sqlite"; # TODO: move to single postgres db
adminpassFile = config.age.secrets.phantom-nextcloud.path;
};
};
diff --git a/overlays/default.nix b/overlays/default.nix
index a032271..8886897 100644
--- a/overlays/default.nix
+++ b/overlays/default.nix
@@ -28,6 +28,14 @@ rec {
];
}
);
+ nerdfonts_fira_hack = (
+ final.nerdfonts.override {
+ fonts = [
+ "FiraCode"
+ "Hack"
+ ];
+ }
+ );
}
);
diff --git a/pkgs/factorio-headless/default.nix b/pkgs/factorio-headless/default.nix
index 8d81f1d..46064b5 100644
--- a/pkgs/factorio-headless/default.nix
+++ b/pkgs/factorio-headless/default.nix
@@ -1,10 +1,10 @@
{ factorio-headless, pkgs }:
factorio-headless.overrideAttrs (_: rec {
- version = "2.0.47";
+ version = "2.0.39";
src = pkgs.fetchurl {
name = "factorio_headless_x64-${version}.tar.xz";
url = "https://www.factorio.com/get-download/${version}/headless/linux64";
- hash = "sha256-8PMgx3YWpHlCJ+tjenC1VxCPMUGkYzJ2WTIgp2j0miY=";
+ hash = "sha256-D4o9DkN5e1/02LhdfDNLCVo/B9mqf4Cx6H+Uk5qT3zQ=";
};
})
diff --git a/scripts/bmenu b/scripts/bmenu
index 8abad08..c793269 100755
--- a/scripts/bmenu
+++ b/scripts/bmenu
@@ -8,10 +8,13 @@
if test "$argv[1]" = "run"
test -n "$argv[2]" && set t "$argv[2]" || set t "terminal"
+ test -n "$i3SOCK" && set wrapper 'i3-msg exec --'
+ test -n "$SWAYSOCK" && set wrapper 'swaymsg exec --'
+
exec j4-dmenu-desktop \
--dmenu="bmenu start -p Iniciar:" \
--term "$t" \
- --i3-ipc \
+ --wrapper="$wrapper" \
--no-generic
end
diff --git a/secrets/monolith/default.yaml b/secrets/monolith/default.yaml
index f354335..8bd8e12 100644
--- a/secrets/monolith/default.yaml
+++ b/secrets/monolith/default.yaml
@@ -4,14 +4,16 @@ gitlab-runners:
thoreb-telemetria-nix: ENC[AES256_GCM,data:zrZvG4be08ulpo7itbrprKK5csCMLvzZjrszfMw1XiJP0FyRTUd9nHgHpbAzbjj2KyT7kKngoZAyengvaTEhkT9sUi1pdGnvajAH8BDDOD0g4LJIHFl4,iv:3bSsTzU7gHx+MchuPg9kmb5xEDugmGPje8Jw74NpRJI=,tag:zffRr77lWbyLt7o/mywb5A==,type:str]
thoreb-itinerario-nix: ENC[AES256_GCM,data:UdAAD0V895sFoEYR56sCG2LlpZugJ0K/nwkTygzWOnbTSmBRAcIQ8qVFPZGw+K+XMSLiCyio6Jp7k8AYP0K1VYm+6aEP3OkqR9FCLQTJgXo=,iv:UGUby50BYkn13OzItk6zZmxc5+SnbZZa4bebQHIow2A=,tag:LjDg3deWwdH2T71EtPo6jA==,type:str]
docker-images-token: ENC[AES256_GCM,data:GGB/KSkjdAyhFKEspAh91ItbqEDf7K/LZSGSn+Jp7SxRfXpDzHIiMD8XJ9PTkGLeQGN4ug1i2nTYPS7d/P5OALWDU+1NPiV9nPdG0w7GERfu4g==,iv:6roabdOKX9xFMf0hWlECd73+943R+hFLos0e2dOpzns=,tag:LrASFc4DtN7aQ+3oOW/p/w==,type:str]
- wopus-gitlab-nix: ENC[AES256_GCM,data:asE7J0d58x9VfQFWc07f5T4s5NZ+/VqMQo66EX93J0LbJ4iI5YjvrrIE4pSI1e4Nz/SRQhltaJ0DfSH0+qgjD4wnAONPRi3UlFbSdGWS2bwwRtWe+Nci2krrUFxV2i/ZVE3CwCkNe4mqtII=,iv:gKrD/LhzI+jnDnX6CdxoHfjpiRdrsuRYJF9rTc8SffM=,tag:TczDGSU3gdKmERjBJ7tP/A==,type:str]
- wopus-gitlab-docker-images: ENC[AES256_GCM,data:aGbCjQr1VKgg5n4f8vZKgdXcDw/M5JHez9E2TqipBXQ8D0jXdfPg6laNOJUOD+uPBOIGKUBMEg4OtLblCZFVw/V6wJN16wVbwkDU3uELQ8tPmlYSt4fcy4+5sC6+tV4YeMSKA6yIjD+xpkk=,iv:ojBhf2WdkWHruvTbABAAvuGDVOnsUl+qnhvH09L+lgA=,tag:gWhEkvL1qlcge3bSKVDSIg==,type:str]
bitbucket-runners:
wopus-runner-1: ENC[AES256_GCM,data:gtH0T5n8qMYpvSv5ciN8+ScGlFDf9xE0FTxNP97vT/qsOCcaItTE+5P+DFcWw46onLED+1c+u0sArFbEsT3f8lyco9b+0l99uOQAxLZQzAXYH8zGye1UnwUtytkci2PHu5c8kTpIWHXyZ1IOYNGWkermeab57ANzOkM1LbkHyAjS6VTh0I60LfAOdHOw5FDFL8d1d9oWxLloOe9USLPqHjC023EpCUT2YuyHoPCTpBu8Kb/2HfV0wkAKaB3dvVrKwXCj+bfP6+bjQ3uMzVO/7jxPmnSGBfvyZ+Hlg5goJ6bSAqQWmnPPnQ96FgQfe8su5ML9qNIp9/7eNiL6Rv6Vhxe0hHbE5wsZ/58grcg/LrugeWJvUJ9THhwcTwO8Pkvwlq0XM9seUY2NV+LCK3bLQ4IWDjWkU1IHg6+nihTcvl1iD6UIGMgqGoB/v05WVzHb+GcE2fFuSuhVHfa5RMyboELOJoFrqZiXGhY=,iv:ZakLafxYQCDd1Zw8T83Xfj+YwAQKna9LC6ognJqtifA=,tag:bwBObfdMIvJfRrOG04NtxA==,type:str]
wopus-runner-2: ENC[AES256_GCM,data:gg8merZMFbf396hdJY7zmKQndT3GzB7NeGZAs3C0au8Zd7OFAg9vcQcFcxNA3kZGJZqmFTR/ycWJwhYr9fhlfFuPhDynVvgJAqoYtvC2MUDiOMD/d3DlfwFjQ6cOGTrvFuY1kkgSFb4OFdrVC1eiTDrGygFmYnYcqTKn/t5Ttqi+cHZNzFzVzdVLvaLCYxltM5g45zn+fXYxYwCfqyb32/M1XTnnwIGiataGxEX5oWhVV4zqeLO4ZIYPSby5AVvIMJ/zqvqaeVVY52GLDcTKrj3thbZxMQLWN3/lOA0uYhi3L/WM8Gx+JMEIbSICcuT7QXu4w4PA+opcx9GnsMCK2/egzS+cNPJ4vGZCdVD/jh6A9zVEJAgXdsHXNXFHmMPt7DcgrCQiub62og4kBY4G/Rcg4UN7sb3v3qyBpGbCGHGRjCFc+wdHpom0yDOG2cwcqfN49pC2R7Ag2BisFQ/5A+DPmKnvGG3kt9s=,iv:5g5XiDecYqi4JNRkZubgPJECBQdZ6rBeojgFe6Etebk=,tag:HRy5bFSbfxKTb5e13lGtgg==,type:str]
wopus-runner-3: ENC[AES256_GCM,data:f9pLYR8t51HtPpLyXysIVaDAhxDrmktJH93E7rb7imtKwK7hRhR8usnvHTcknLfD7BMvStAIYefdGt19u7PrQu6vqc19bEcNbnK5OH4KBP6+X47oMgBYtbIGXH+t3dSDt22fSIoppTwdX7/Kf4vqesfN8K7EunETvFR86oyyKdy15mvXr0XUO4us4HZjnIOBEnOm1P/V8hk5JcCpRuo+8ZYmBe5gzq5pTnqnYlPE1EovM7eDMg72J7ev07h50qvySrAqmNiqDcXfTPQ2TzuHx3XxAYqFybf1L6P9OnLB6RDAlpoFJ0h8dSg2tzC2+amYsBP0UIBK/ZhWvvAjpX+MZrTASjenh/tefDcNdbsXDOr7A4i/261z4rC0r+97INglCN1N/SZg51iBHiRAVV1zibDLfioR5+eBIykWAtjILMoYU+zOcr0E8K0I9jQGMtpnYmvHJqV0DVcdfZpJptrPUUy+lQ/iZVcPpLs=,iv:grzvVsfpUzywjNE4jvTxXKG3TYajrvSsQgfOgtafvIo=,tag:K1B6crN0ckLk0EYBtGHDkw==,type:str]
wopus-runner-4: ENC[AES256_GCM,data:D1Zq0BtPuACnutAbUcj3gYSMLuIZcMuqc/1mEFmitEG0tBFMWhkabS+8lXcp8sb1DM0LTDMEwgMB9FVyFb670MKQNEncqQtaNJtY1BxS3SolovDAM/I+i6YGvd4X8jX99d+7ZNR6xGBWJ/dW8rz4QnIM8Eh3FDOqaFa/ltfyPKP9IZ2uZi67C/n8Q/OSdgMQkt+QxhgJfSghE1iruPwxyGlqv+E4SZNI/fQQMjX0Lh7z02ms58yyMtjO71YbukV/JXFRsdJrqY2wfH/6NlZbsKideoSxluBRVqmbW6KQd7dUT819KbOSu9CFdgThtVCU8qiv3jbAbn8D5xRy4AAOEfSqRLXJoj7otCqr47R/8+0BdS3aztFBjL3lDmprMWZ4+LD55fvczfpxUF9ox1mhcjIvCvZJJL06XsST1XRXa7i2fr4/a/XhCmQgIzar5IYxSC9OjuHp6jLsTaY3ZUgid5W1L1n8uWSmA98=,iv:O9caRG//brERiIhuMrsFdTz6TnPY0rdQnvHEu0P42yM=,tag:hrmwLX/CRhZfammJ2nfTPw==,type:str]
sops:
+ kms: []
+ gcp_kms: []
+ azure_kv: []
+ hc_vault: []
age:
- recipient: age1zrgu7w8059xydagm60phnffghvfe9h2ca58cx8qwagqpyfuvs9fqw79c8h
enc: |
@@ -31,8 +33,8 @@ sops:
aFVxcDFhaGdYekRWRVFIWnRsZndtZFkKgsvxOFHOcO306Z9FkucA1fDOpZA8N1/h
jYmIgcKTFgWoSCvux67lK30jFsYp7sm5z6WxxDYsGcoQ/+pxoUX2jQ==
-----END AGE ENCRYPTED FILE-----
- lastmodified: "2025-05-28T03:04:52Z"
- mac: ENC[AES256_GCM,data:THwZcK7nJnCYEUR8CiaQKZ8dQpYbDqnshBBWFzEzPXEWLgFB9+7d6aRh9ZDjZs0rhBTChta3H7YxDJdFh5nAJQy532FJp4S4tBOLHWFZARlKhXngujd0SvxPER55uvxImNFIYX0RDSHUck5jDXCA0tBCmE/Q7DuY7v0+cmRgOV8=,iv:1p3kFMSg0k1n00P6UY5Tttuqvpsb4Se8km5zA9GhAu4=,tag:cDxbHZ+eScDQacwV1sYGIA==,type:str]
+ lastmodified: "2025-03-07T21:28:04Z"
+ mac: ENC[AES256_GCM,data:4lOafZQ6PP38CByulzA/J86sw+TpQhj40s1lTRXqUtpt72yH8nQK8dXpw0dNYvDBtDpKRvNTHZubzalEua6n2lCQL7rsZ2+fo6FJ4ht2Kb70dddDcWEyrfyZQ2FaKC5L/QjqM0SbIfPszNvyQ8wIaOoMfNJBis5QOjRSGDAcJm8=,iv:LLT0oJW+3KNe1nKphCK0c5FPIuh8GfnDrvNDCFhP4NM=,tag:rPbVY7L1qxNc3aCfv77FAg==,type:str]
pgp:
- created_at: "2025-03-07T22:49:16Z"
enc: |-
@@ -50,4 +52,4 @@ sops:
-----END PGP MESSAGE-----
fp: 0FECE8316E74BA6F44EFC21A2F8F21CE8721456B
unencrypted_suffix: _unencrypted
- version: 3.10.2
+ version: 3.9.4-unstable
diff --git a/system/fonts.nix b/system/fonts.nix
index 73aa8f7..2815563 100644
--- a/system/fonts.nix
+++ b/system/fonts.nix
@@ -5,7 +5,6 @@
noto-fonts
noto-fonts-cjk-sans
noto-fonts-emoji
- nerd-fonts.fira-code
- nerd-fonts.hack
+ nerdfonts_fira_hack
];
}
diff --git a/system/gitlab-runner.nix b/system/gitlab-runner.nix
index 8db526f..c50e1b9 100644
--- a/system/gitlab-runner.nix
+++ b/system/gitlab-runner.nix
@@ -1,55 +1,51 @@
{ pkgs, lib, ... }:
-let
- installNixScript = pkgs.writeScriptBin "install-nix" ''
- mkdir -p -m 0755 /nix/var/log/nix/drvs
- mkdir -p -m 0755 /nix/var/nix/gcroots
- mkdir -p -m 0755 /nix/var/nix/profiles
- mkdir -p -m 0755 /nix/var/nix/temproots
- mkdir -p -m 0755 /nix/var/nix/userpool
- mkdir -p -m 1777 /nix/var/nix/gcroots/per-user
- mkdir -p -m 1777 /nix/var/nix/profiles/per-user
- mkdir -p -m 0755 /nix/var/nix/profiles/per-user/root
- mkdir -p -m 0700 "$HOME/.nix-defexpr"
-
- . ${pkgs.nix}/etc/profile.d/nix.sh
-
- ${pkgs.nix}/bin/nix-env -i ${
- lib.concatStringsSep " " (
- with pkgs;
- [
- nix
- cacert
- git
- openssh
- docker
- ]
- )
- }
- '';
-in
{
- mkNixRunner = authenticationTokenConfigFile: {
- # File should contain at least these two variables:
- # `CI_SERVER_URL`
- # `REGISTRATION_TOKEN`
- inherit authenticationTokenConfigFile; # 2
- dockerImage = "alpine:3.18.2";
- dockerVolumes = [
- "/etc/nix/nix.conf:/etc/nix/nix.conf:ro"
- "/nix/store:/nix/store:ro"
- "/nix/var/nix/db:/nix/var/nix/db:ro"
- "/nix/var/nix/daemon-socket:/nix/var/nix/daemon-socket:ro"
- "/tmp:/tmp"
- "/var/run/docker.sock:/var/run/docker.sock"
- "/var/lib/docker/containers:/var/lib/docker/containers"
- ];
- dockerDisableCache = true;
- preBuildScript = "\". ${lib.getExe installNixScript}\"";
- environmentVariables = {
- ENV = "/etc/profile";
- USER = "root";
- NIX_REMOTE = "daemon";
- NIX_SSL_CERT_FILE = "/nix/var/nix/profiles/default/etc/ssl/certs/ca-bundle.crt";
+ mkNixRunner =
+ authenticationTokenConfigFile: with lib; rec {
+ # File should contain at least these two variables:
+ # `CI_SERVER_URL`
+ # `REGISTRATION_TOKEN`
+ inherit authenticationTokenConfigFile; # 2
+ dockerImage = "alpine:3.18.2";
+ dockerAllowedImages = [ dockerImage ];
+ dockerVolumes = [
+ "/etc/nix/nix.conf:/etc/nix/nix.conf:ro"
+ "/nix/store:/nix/store:ro"
+ "/nix/var/nix/db:/nix/var/nix/db:ro"
+ "/nix/var/nix/daemon-socket:/nix/var/nix/daemon-socket:ro"
+ ];
+ dockerDisableCache = true;
+ preBuildScript = pkgs.writeScript "setup-container" ''
+ mkdir -p -m 0755 /nix/var/log/nix/drvs
+ mkdir -p -m 0755 /nix/var/nix/gcroots
+ mkdir -p -m 0755 /nix/var/nix/profiles
+ mkdir -p -m 0755 /nix/var/nix/temproots
+ mkdir -p -m 0755 /nix/var/nix/userpool
+ mkdir -p -m 1777 /nix/var/nix/gcroots/per-user
+ mkdir -p -m 1777 /nix/var/nix/profiles/per-user
+ mkdir -p -m 0755 /nix/var/nix/profiles/per-user/root
+ mkdir -p -m 0700 "$HOME/.nix-defexpr"
+
+ . ${pkgs.nix}/etc/profile.d/nix.sh
+
+ ${pkgs.nix}/bin/nix-env -i ${
+ concatStringsSep " " (
+ with pkgs;
+ [
+ nix
+ cacert
+ git
+ openssh
+ ]
+ )
+ }
+ '';
+ environmentVariables = {
+ ENV = "/etc/profile";
+ USER = "root";
+ NIX_REMOTE = "daemon";
+ PATH = "/nix/var/nix/profiles/default/bin:/nix/var/nix/profiles/default/sbin:/bin:/sbin:/usr/bin:/usr/sbin";
+ NIX_SSL_CERT_FILE = "/nix/var/nix/profiles/default/etc/ssl/certs/ca-bundle.crt";
+ };
};
- };
}
diff --git a/system/locale.nix b/system/locale.nix
index e2c7e81..07e7175 100644
--- a/system/locale.nix
+++ b/system/locale.nix
@@ -2,7 +2,7 @@
{
time.timeZone = "America/Sao_Paulo";
environment.variables.TZ = config.time.timeZone;
- i18n.defaultLocale = "pt_BR.UTF-8";
+ i18n.defaultLocale = "pt_BR.utf8";
# Configure keymap in X11
services.xserver.xkb = {
diff --git a/system/monolith-gitlab-runner.nix b/system/monolith-gitlab-runner.nix
index dd80627..28a0ecd 100644
--- a/system/monolith-gitlab-runner.nix
+++ b/system/monolith-gitlab-runner.nix
@@ -18,8 +18,6 @@ in
thoreb-telemetria-nix = mkNixRunner config.sops.secrets."gitlab-runners/thoreb-telemetria-nix".path;
thoreb-itinerario-nix = mkNixRunner config.sops.secrets."gitlab-runners/thoreb-itinerario-nix".path;
- wopus-gitlab-nix = mkNixRunner config.sops.secrets."gitlab-runners/wopus-gitlab-nix".path;
-
default = {
# File should contain at least these two variables:
# `CI_SERVER_URL`
@@ -27,15 +25,6 @@ in
authenticationTokenConfigFile = config.sops.secrets."gitlab-runners/docker-images-token".path;
dockerImage = "debian:stable";
};
-
- wopus-gitlab-docker-images = {
- # File should contain at least these two variables:
- # `CI_SERVER_URL`
- # `CI_SERVER_TOKEN`
- authenticationTokenConfigFile =
- config.sops.secrets."gitlab-runners/wopus-gitlab-docker-images".path;
- dockerImage = "debian:stable";
- };
};
};
systemd.services.gitlab-runner.serviceConfig.Nice = 10;
@@ -50,11 +39,5 @@ in
"gitlab-runners/docker-images-token" = {
sopsFile = ../secrets/monolith/default.yaml;
};
- "gitlab-runners/wopus-gitlab-nix" = {
- sopsFile = ../secrets/monolith/default.yaml;
- };
- "gitlab-runners/wopus-gitlab-docker-images" = {
- sopsFile = ../secrets/monolith/default.yaml;
- };
};
}
diff --git a/user/cursor/cursor.desktop b/user/cursor/cursor.desktop
new file mode 100644
index 0000000..04ec82e
--- /dev/null
+++ b/user/cursor/cursor.desktop
@@ -0,0 +1,15 @@
+[Desktop Entry]
+Name=Cursor
+Exec=/home/lelgenio/.local/bin/cursor --enable-features=UseOzonePlatform --ozone-platform-hint=wayland %F
+Path=/home/lelgenio/.local/bin
+Icon=/home/lelgenio/.icons/cursor.png
+Type=Application
+Categories=Utility;Development;
+StartupWMClass=Cursor
+X-AppImage-Version=latest
+Comment=Cursor is an AI-first coding environment.
+MimeType=x-scheme-handler/cursor;
+
+
+[Desktop Action new-empty-window]
+Exec=/home/lelgenio/.local/bin/cursor --enable-features=UseOzonePlatformc --ozone-platform-hint --new-window %F
diff --git a/user/cursor/default.nix b/user/cursor/default.nix
new file mode 100644
index 0000000..46d32c7
--- /dev/null
+++ b/user/cursor/default.nix
@@ -0,0 +1,20 @@
+{
+ pkgs,
+ lib,
+ ...
+}:
+{
+ options.cursor = {
+ enable = lib.mkEnableOption { };
+ };
+
+ config = lib.mkIf config.cursor.enable {
+ home.file = {
+ "${config.home.homeDirectory}/.local/share/applications/cursor.desktop".source = ./cursor.desktop;
+ "${config.home.homeDirectory}/.config/Cusor/User/keybindings.json".source =
+ config.lib.file.mkOutOfStoreSymlink "${config.home.homeDirectory}/projects/nixos-config/user/cursor/keybindings.json";
+ "${config.home.homeDirectory}/.config/Cursor/User/settings.json".source =
+ config.lib.file.mkOutOfStoreSymlink "${config.home.homeDirectory}/projects/nixos-config/user/cursor/settings.json";
+ };
+ };
+}
diff --git a/user/cursor/keybindings.json b/user/cursor/keybindings.json
new file mode 100644
index 0000000..0637a08
--- /dev/null
+++ b/user/cursor/keybindings.json
@@ -0,0 +1 @@
+[]
\ No newline at end of file
diff --git a/user/cursor/settings.json b/user/cursor/settings.json
new file mode 100644
index 0000000..08b5adb
--- /dev/null
+++ b/user/cursor/settings.json
@@ -0,0 +1,34 @@
+{
+ "terminal.integrated.sendKeybindingsToShell": true,
+ "window.titleBarStyle": "custom",
+ "workbench.preferredDarkColorTheme": "GitHub Dark",
+ "workbench.preferredLightColorTheme": "GitHub Light",
+ "window.autoDetectColorScheme": true,
+ "workbench.colorTheme": "GitHub Dark",
+ "git.autofetch": true,
+ "git.confirmSync": false,
+ "editor.suggest.snippetsPreventQuickSuggestions": false,
+ "update.mode": "none",
+ "intelephense.files.exclude": [
+ "**/.git/**",
+ "**/.svn/**",
+ "**/.hg/**",
+ "**/CVS/**",
+ "**/.DS_Store/**",
+ "**/node_modules/**",
+ "**/bower_components/**",
+ "**/vendor/**/{Tests,tests}/**",
+ "**/.history/**",
+ "**/vendor/**/vendor/**",
+ "**/.direnv/**"
+ ],
+ "intelephense.format.braces": "k&r",
+ "window.commandCenter": 1,
+ "files.exclude": {
+ "**/.deps": true,
+ "**/.direnv": true
+ },
+ "diffEditor.renderSideBySide": false,
+ "laravel-pint.enable": true,
+ "editor.formatOnSave": true
+}
\ No newline at end of file
diff --git a/user/firefox.nix b/user/firefox.nix
index 0403a14..7d8d65f 100644
--- a/user/firefox.nix
+++ b/user/firefox.nix
@@ -1,11 +1,12 @@
{
config,
pkgs,
+ lib,
+ font,
...
}:
let
- inherit (config.my.theme) color;
-
+ inherit (config.my) desktop browser;
bugfixedFirefox = pkgs.firefox-devedition-unwrapped // {
requireSigning = false;
allowAddonSideload = true;
@@ -27,11 +28,11 @@ in
url = "https://addons.mozilla.org/firefox/downloads/file/4202411/sponsorblock-5.4.29.xpi";
hash = "sha256-7Xqc8cyQNylMe5/dgDOx1f2QDVmz3JshDlTueu6AcSg=";
})
- # (pkgs.fetchFirefoxAddon {
- # name = "tree-style-tab";
- # url = "https://addons.mozilla.org/firefox/downloads/file/4197314/tree_style_tab-3.9.19.xpi";
- # hash = "sha256-u2f0elVPj5N/QXa+5hRJResPJAYwuT9z0s/0nwmFtVo=";
- # })
+ (pkgs.fetchFirefoxAddon {
+ name = "tree-style-tab";
+ url = "https://addons.mozilla.org/firefox/downloads/file/4197314/tree_style_tab-3.9.19.xpi";
+ hash = "sha256-u2f0elVPj5N/QXa+5hRJResPJAYwuT9z0s/0nwmFtVo=";
+ })
(pkgs.fetchFirefoxAddon {
name = "ublock-origin";
url = "https://addons.mozilla.org/firefox/downloads/file/4290466/ublock_origin-1.58.0.xpi";
@@ -55,15 +56,10 @@ in
hash = "sha256-lKLX6IWWtliRdH1Ig33rVEB4DVfbeuMw0dfUPV/mSSI=";
})
(pkgs.fetchFirefoxAddon {
- name = "unhook";
- url = "https://addons.mozilla.org/firefox/downloads/file/4263531/youtube_recommended_videos-1.6.7.xpi";
- hash = "sha256-u21ouN9IyOzkTkFSeDz+QBp9psJ1F2Nmsvqp6nh0DRU=";
+ name = "invidious_redirect";
+ url = "https://addons.mozilla.org/firefox/downloads/file/4292924/invidious_redirect_2-1.16.xpi";
+ hash = "sha256-ApCc+MNmW9Wd/5seV6npePQVEaszT/rhD9EB7HGiUb8=";
})
- # (pkgs.fetchFirefoxAddon {
- # name = "invidious_redirect";
- # url = "https://addons.mozilla.org/firefox/downloads/file/4292924/invidious_redirect_2-1.16.xpi";
- # hash = "sha256-ApCc+MNmW9Wd/5seV6npePQVEaszT/rhD9EB7HGiUb8=";
- # })
(pkgs.fetchFirefoxAddon {
name = "substitoot";
@@ -88,14 +84,13 @@ in
dev-edition-default = {
isDefault = true;
search.force = true;
- search.default = "ddg";
+ search.default = "DuckDuckGo";
settings = {
"devtools.theme" = "auto";
"toolkit.legacyUserProfileCustomizations.stylesheets" = true;
+ "browser.tabs.inTitlebar" = if desktop == "sway" then 0 else 1;
"sidebar.position_start" = false; # Move sidebar to the right
- "browser.tabs.groups.enabled" = true;
-
# enable media RDD to allow gpu acceleration
"media.rdd-ffmpeg.enabled" = true;
"media.rdd-ffvpx.enabled" = true;
@@ -112,6 +107,8 @@ in
"media.ffmpeg.vaapi.enabled" = true;
"media.ffvpx.enabled" = true;
+ "gfx.webrender.all" = true;
+
# Enable installing non signed extensions
"extensions.langpacks.signatures.required" = false;
"xpinstall.signatures.required" = false;
@@ -122,22 +119,26 @@ in
"devtools.chrome.enabled" = true;
"devtools.debugger.remote-enabled" = true;
};
- userChrome = ''
- #sidebar-main {
- background-color: ${color.bg};
- }
-
- #tabbrowser-tabbox {
- outline-width: 0 !important;
- }
- '';
+ userChrome =
+ if desktop == "sway" then
+ ''
+ #titlebar { display: none !important; }
+ #TabsToolbar { display: none !important; }
+ #sidebar-header { display: none !important; }
+ ''
+ else
+ "";
};
};
};
wayland.windowManager.sway = {
extraConfig = ''
- exec firefox-devedition
+ exec firefox
'';
};
+ home.sessionVariables = {
+ MOZ_ENABLE_WAYLAND = "1";
+ MOZ_DISABLE_RDD_SANDBOX = "1";
+ };
};
}
diff --git a/user/gnome.nix b/user/gnome.nix
index 776f095..e52c3b2 100644
--- a/user/gnome.nix
+++ b/user/gnome.nix
@@ -43,7 +43,7 @@ lib.mkIf (config.my.desktop == "gnome") {
qt6Packages.qtstyleplugin-kvantum
];
- services.gpg-agent.pinentryPackage = pkgs.pinentry-gnome;
+ services.gpg-agent.pinentryPackage = lib.mkForce pkgs.pinentry-gnome3;
xdg.defaultApplications = {
enable = lib.mkForce false;
diff --git a/user/home.nix b/user/home.nix
index 334e260..31e3871 100644
--- a/user/home.nix
+++ b/user/home.nix
@@ -152,7 +152,7 @@
text-editor = lib.mkDefault "kak.desktop";
image-viewer = lib.mkDefault "pqiv.desktop";
video-player = lib.mkDefault "mpv.desktop";
- web-browser = lib.mkDefault "firefox-devedition.desktop";
+ web-browser = lib.mkDefault "firefox.desktop";
document-viewer = lib.mkDefault "org.pwmt.zathura.desktop";
file-manager = lib.mkDefault "thunar.desktop";
archive-manager = "engrampa.desktop";
diff --git a/user/kakoune/default.nix b/user/kakoune/default.nix
index fa63e6b..a015bd0 100644
--- a/user/kakoune/default.nix
+++ b/user/kakoune/default.nix
@@ -82,9 +82,6 @@ in
rev = "1cc6baeb14b773916eb9209469aa77b3cfa67a0a";
sha256 = "sha256-3PLxG9UtT0MMSibvTviXQIgTH3rApZ3WSbNCEH3c7HE=";
};
- buildInputs = with pkgs; [
- python3Minimal
- ];
})
];
extraConfig =
diff --git a/user/kakoune/filetypes.kak b/user/kakoune/filetypes.kak
index 9fa33a6..7ea774e 100644
--- a/user/kakoune/filetypes.kak
+++ b/user/kakoune/filetypes.kak
@@ -15,16 +15,8 @@ hook global WinSetOption filetype=nix %{
set buffer formatcmd 'nixfmt'
}
-hook global BufCreate .*\.json %{
- set buffer formatcmd "prettier --stdin-filepath=%val{buffile}"
-}
-
-hook global BufCreate .*\.ya?ml %{
- set buffer formatcmd "prettier --stdin-filepath=%val{buffile}"
-}
-
hook global BufCreate .*\.html %{
- set buffer formatcmd "prettier --stdin-filepath=%val{buffile}"
+ set buffer formatcmd 'prettier --parser html'
}
hook global BufCreate .*\.component\.html %{
@@ -43,15 +35,11 @@ hook global BufCreate .*\.php %{
}
hook global BufCreate .*\.js %{
- set buffer formatcmd "prettier --stdin-filepath=%val{buffile}"
-}
-
-hook global BufCreate .*\.ts %{
- set buffer formatcmd "prettier --stdin-filepath=%val{buffile}"
+ set buffer formatcmd 'prettier --parser babel'
}
hook global BufCreate .*\.scss %{
- set buffer formatcmd "prettier --stdin-filepath=%val{buffile}"
+ set buffer formatcmd 'prettier --parser scss'
}
hook global BufCreate .*\.vue %{
diff --git a/user/ranger/rc.conf b/user/ranger/rc.conf
index ad71849..3936f36 100644
--- a/user/ranger/rc.conf
+++ b/user/ranger/rc.conf
@@ -27,10 +27,10 @@ set confirm_on_delete multiple
# Use non-default path for file preview script?
# ranger ships with scope.sh, a script that calls external programs (see
# README.md for dependencies) to preview images, archives, etc.
-# set preview_script ~/.config/ranger/scope.sh
+set preview_script ~/.config/ranger/scope.sh
# Use the external preview script or display simple plain text or image previews?
-# set use_preview_script true
+set use_preview_script true
# Automatically count files in the directory, even before entering them?
set automatically_count_files true
@@ -40,7 +40,7 @@ set automatically_count_files true
set open_all_images true
# Be aware of version control systems and display information.
-set vcs_aware false
+set vcs_aware true
# State of the four backends git, hg, bzr, svn. The possible states are
# disabled, local (only show local info), enabled (show local and remote
diff --git a/user/sway/default.nix b/user/sway/default.nix
index 596fdde..04193aa 100644
--- a/user/sway/default.nix
+++ b/user/sway/default.nix
@@ -20,7 +20,6 @@ in
./swayidle.nix
./swaylock.nix
./theme.nix
- ./gammastep.nix
];
options.my.sway.enable = lib.mkEnableOption { };
@@ -33,7 +32,6 @@ in
my.mpd.enable = true;
my.zathura.enable = true;
my.waybar.enable = true;
- my.gammastep.enable = true;
wayland.windowManager.sway = {
enable = true;
@@ -117,6 +115,10 @@ in
exec_always systemctl --user restart waybar.service
'';
};
+ services.gammastep = {
+ enable = true;
+ provider = "geoclue2";
+ };
services.kdeconnect = {
enable = true;
@@ -125,10 +127,7 @@ in
services.gpg-agent.pinentryPackage = pkgs.pinentry-all;
- xdg.configFile."OpenTabletDriver/settings.json" = {
- force = true;
- source = ./open-tablet-driver.json;
- };
+ xdg.configFile."OpenTabletDriver/settings.json".source = ./open-tablet-driver.json;
home.packages = with pkgs; [
mySway
diff --git a/user/sway/gammastep.nix b/user/sway/gammastep.nix
deleted file mode 100644
index a5b6917..0000000
--- a/user/sway/gammastep.nix
+++ /dev/null
@@ -1,19 +0,0 @@
-{ config, lib, ... }:
-let
- cfg = config.my.gammastep;
-in
-{
- options.my.gammastep.enable = lib.mkEnableOption { };
-
- config = lib.mkIf cfg.enable {
- services.gammastep = {
- enable = true;
- dawnTime = "6:00-7:45";
- duskTime = "18:35-20:15";
- temperature = {
- day = 6500;
- night = 4500;
- };
- };
- };
-}
diff --git a/user/sway/mako.nix b/user/sway/mako.nix
index 28b5eb4..af6c673 100644
--- a/user/sway/mako.nix
+++ b/user/sway/mako.nix
@@ -34,13 +34,12 @@ in
defaultTimeout = 10000;
- settings = {
- "app-name=volumesh" = {
- "default-timeout" = "5000";
- "group-by" = "app-name";
- "format" = "%s\\n%b";
- };
- };
+ extraConfig = ''
+ [app-name=volumesh]
+ default-timeout=5000
+ group-by=app-name
+ format=%s\n%b
+ '';
# # {{@@ header() @@}}
# # text
diff --git a/user/sway/theme.nix b/user/sway/theme.nix
index 600f596..731d12a 100644
--- a/user/sway/theme.nix
+++ b/user/sway/theme.nix
@@ -55,7 +55,7 @@ lib.mkIf (desktop == "sway") {
qt = {
enable = true;
platformTheme.name = "gtk3";
- style.name = "kvantum";
+ style.name = "qt5ct";
};
dconf.settings = {
@@ -70,6 +70,28 @@ lib.mkIf (desktop == "sway") {
};
};
+ # fonts.fontconfig.enable = true;
+ xdg.configFile = {
+ "qt5ct/qt5ct.conf".text = ''
+ [Appearance]
+ # color_scheme_path=/nix/store/f07mk0vrm47jxw3y5v99hxncy0w4vcyq-qt5ct-1.5/share/qt5ct/colors/darker.conf
+ custom_palette=false
+ icon_theme=${icon_theme}
+ standard_dialogs=default
+ style=kvantum-dark
+
+ # [Fonts]
+ # fixed=@Variant(\0\0\0@\0\0\0\x1c\0H\0\x61\0\x63\0k\0 \0N\0\x65\0r\0\x64\0 \0\x46\0o\0n\0t@(\0\0\0\0\0\0\xff\xff\xff\xff\x5\x1\0\x32\x10)
+ # general=@Variant(\0\0\0@\0\0\0\x1e\0L\0i\0\x62\0\x65\0r\0\x61\0t\0i\0o\0n\0 \0S\0\x61\0n\0s@(\0\0\0\0\0\0\xff\xff\xff\xff\x5\x1\0\x32\x10)
+ '';
+ "kdedefaults/kdeglobals".text = ''
+ [General]
+ ColorScheme=BreezeDark
+
+ [Icons]
+ Theme=${icon_theme}
+ '';
+ };
services.xsettingsd = {
enable = true;
settings = {
@@ -83,6 +105,11 @@ lib.mkIf (desktop == "sway") {
};
home.packages = with pkgs; [
+ libsForQt5.qt5ct
+ libsForQt5.qtstyleplugin-kvantum
+ qt6Packages.qt6ct
+ qt6Packages.qtstyleplugin-kvantum
+
pkgs.bibata-cursors
pkgs.orchis_theme_compact
pkgs.papirus_red
@@ -92,6 +119,7 @@ lib.mkIf (desktop == "sway") {
hack-font
font-awesome_5
fira-code
+ nerdfonts_fira_hack
material-wifi-icons
];
}
diff --git a/user/variables.nix b/user/variables.nix
index 65bc69a..7d56cf3 100644
--- a/user/variables.nix
+++ b/user/variables.nix
@@ -115,7 +115,7 @@ rec {
};
dmenu = "bmenu";
- desktop = "sway";
- browser = "firefox-devedition";
+ desktop = "gnome";
+ browser = "firefox";
editor = "kakoune";
}
diff --git a/user/xdg-dirs.nix b/user/xdg-dirs.nix
index c4036c2..a9e1c9b 100644
--- a/user/xdg-dirs.nix
+++ b/user/xdg-dirs.nix
@@ -1,5 +1,8 @@
{
config,
+ pkgs,
+ lib,
+ inputs,
...
}:
let
@@ -21,4 +24,9 @@ in
videos = "${HOME}/VĂdeos";
};
};
+
+ home.sessionVariables = {
+ CARGO_HOME = "${config.xdg.dataHome}/cargo";
+ RUSTUP_HOME = "${config.xdg.dataHome}/rustup";
+ };
}